-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Releases should not depend on insecure or untrusted code #855
Comments
Thanks for reporting this. I'll try to fix this. |
Heads up, I plan to publish a public disclosure about this industry-wide vulnerability on June 10th, 2019. |
Ping! |
I'll take care of this before the deadline. |
@donat This will also need a CVE issued. That can be done through @waynebeaton as the Eclipse Foundation is a CNA. See this format as an example: |
I've implemented the fix for this issue. See the PR ☝️. |
@donat You need to file for the CVE with @waynebeaton using the Eclipse bug tracker. Since the Eclipse organization is a CNA, the Eclipse security team does the reporting. You or some other contributor needs to be the one to ask @waynebeaton to do the filing.
|
CVE request submitted: https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 |
CWE-829: Inclusion of Functionality from Untrusted Control Sphere
The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.
This vulnerability has a CVSS v3.0 Base Score of 8.1/10
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
This isn't just theoretical
POC code exists already to maliciously compromise a JAR file inflight.
See:
MITM Attacks Increasingly Common:
See:
Source Locations:
Download of Eclipse SDK:
Eclipse SDK has no checksum verification:
Download of Gradle:
The text was updated successfully, but these errors were encountered: